- Signing of container images- Performing overall vulnerability scans in container images- Understanding the difference between using a container vs Virtual Machine (VM)- Best practices to limit the exposure such as not running services as 'root', limiting container's resources that can be used by the container, avoiding privileged mode, repeatable CI/CD pipeline that includes fixes, security patches, the use of capabilities, and use secrets for sensitive information- Understanding containers security aspects at runtime with network security- Monitoring and securing containers already in production